• Title/Summary/Keyword: Personal cloud

Search Result 196, Processing Time 0.024 seconds

Personalization Recommendation Service using OWL Modeling (OWL 모델링을 이용한 개인 추천 서비스)

  • Ahn, Hyo-Sik;Jeong, Hoon;Chang, Hyo-Kyung;Choi, Eui-In
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.309-315
    • /
    • 2012
  • The dissemination of smartphones is being spread and supplementary services using smartphones are increasing and various as the Mobile network and device are developing rapidly, so smartphones that enables to provide a wide range of services is expected to receive the most attention. It makes users listen to music anytime, anywhere in real-time, use useful applications, and access to Internet to search for information. The service environment is changing on PC into Mobile due to the change of the circumstance mentioned above. these services are done by using just location information rather than other context, and users have to search services and use them. It is essential to have Context-aware technology for personalization recommendation services and the appropriate representation and definition of Context information for context-aware. Ontology is possible to represent knowledge freely and knowledge can be extended by inferring. In addition, design of the ontology model is needed according to the purposes of utilization. This paper used context-aware technologies to implement a user personalization recommendation service. It also defined the context through OWL modeling for user personalization recommendation service and used inference rules and inference engine for context reasoning.

The Impact of Multi-dimensional Trust for Customer Satisfaction

  • Choi, Jae-Won;Sohn, Chang-Soo;Lee, Hong-Joo
    • Management Science and Financial Engineering
    • /
    • v.16 no.2
    • /
    • pp.81-97
    • /
    • 2010
  • Trust is one of the most important aspects of the relationship between retailers and consumers in e-commerce. Users may have concerns about transaction security or personal information leakage when they engage in transactions over the Internet. It can be difficult to attract customers if the retailers or service providers cannot establish trust with their customers. There have been many studies of trust-building mechanisms between customers and e-storefronts. However, little work has been done on identifying the relationships between customer satisfaction, purchase intention, and trust. In addition, trust building occurs in the pre- and post-purchase phases of an e-commerce transaction, as well as gradually over repeated transactions. Thus we distinguish between cue-based trust and experience-based trust. The objective of this study was to explain the impact of trust on customer satisfaction and purchase intention in relation to e-commerce sites from the perspective of a multi-dimensional concept of trust. We surveyed 350 undergraduate students and obtained 331 responses for analysis. The result of our analysis showed that cue-based trust has a positive relationship with trust based on experience. Although the two concepts of trust have positive relationships with satisfaction, the path coefficient of trust based on experience was higher than that of cue-based trust. In addition, the purchase intention mediates the relationship between cue-based trust and experience-based trust.

Interface Development for Pre and Post processor on EDISON Platform Simulation System (EDISON 플랫폼 시뮬레이션 시스템에서 전처리 및 후처리기 연계를 위한 인터페이스 개발)

  • Kwon, Yejin;Jeon, Inho;Seo, Jerry H.;Lee, Jongsuk R.
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.103-110
    • /
    • 2020
  • The EDISON is a platform that supports numerical analysis for problem solving in computational science and engineering. We provide a cloud service for users, and provide an environment to access and execution of the simulation service on the web. For now, the EDISON platform provides simulation services for eight applied field on computational science engineering. Users can check the numerical analysis result by web in the computational science and engineering platform. In addition, various services such as community activity with other researchers, and the configuration of simulation environment by user 's needs can be provided. A representative service of the EDISON platform is a web-based simulation service that performs numerical analysis for problem solving of various computational science and engineering. Currently, EDISON platform provides workbench simulation service. It is the web-based simulation execution environment, and result analysis to provide simulation regardless of various personal computing resource or environment in each numerical analysis. In this paper, we build an interface for pre and post processor that can be used in conjunction with the workbench-based simulation service provided by EDISON platform. We provide a development environment with interface that is implemented by applying a pre and post processor optimized for the simulation service. According to simulation and execution are performed by linking the new workbench-based simulation service to the pre and post processor.

The Big Data Analysis and Medical Quality Management for Wellness (웰니스를 위한 빅데이터 분석과 의료 질 관리)

  • Cho, Young-Bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.101-109
    • /
    • 2014
  • Medical technology development and increase the income level of a "Long and healthy Life=Wellness," with the growing interest in actively promoting and maintaining health and wellness has become enlarged. In addition, the demand for personalized health care services is growing and extensive medical moves of big data, disease prevention, too. In this paper, the main interest in the market, highlighting wellness in order to support big data-driven healthcare quality through patient-centered medical services purposes. Patients with drug dependence treatment is not to diet but to improve disease prevention and treatment based on analysis of big data. Analysing your Tweets-daily information and wellness disease prevention and treatment, based on the purpose of the dictionary. Efficient big data analysis for node while increasing processing time experiment. Test result case of total access time efficient 26% of one node to three nodes and case of data storage is 63%, case of data aggregate is 18% efficient of one node to three nodes.

A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos (Kerberos 기반 하둡 분산 파일 시스템의 안전성 향상방안)

  • Park, So Hyeon;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.803-813
    • /
    • 2013
  • As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.

Knowledge Creation Structure of Big Data Research Domain (빅데이터 연구영역의 지식창출 구조)

  • Namn, Su-Hyeon
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.129-136
    • /
    • 2015
  • We investigate the underlying structure of big data research domain, which is diversified and complicated using bottom-up approach. For that purpose, we derive a set of articles by searching "big data" through the Korea Citation Index System provided by National Research Foundation of Korea. With some preprocessing on the author-provided keywords, we analyze bibliometric data such as author-provided keywords, publication year, author, and journal characteristics. From the analysis, we both identify major sub-domains of big data research area and discover the hidden issues which made big data complex. Major keywords identified include SOCIAL NETWORK ANALYSIS, HADOOP, MAPREDUCE, PERSONAL INFORMATION POLICY/PROTECTION/PRIVATE INFORMATION, CLOUD COMPUTING, VISUALIZATION, and DATA MINING. We finally suggest missing research themes to make big data a sustainable management innovation and convergence medium.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Personal Information Detection and Blurring Cloud Services Based on Machine Learning (머신러닝에 기반을 둔 사진 속 개인정보 검출 및 블러링 클라우드 서비스)

  • Kim, Min-jeong;Lee, Soo-young;Lee, Jiyoung;Ham, Na-youn
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.152-155
    • /
    • 2019
  • 클라우드가 대중화되어 많은 모바일 유저들이 자동 백업 기능을 사용하면서 민감한 개인정보가 포함된 사진들이 무분별하게 클라우드에 업로드 되고 있다. 개인정보를 포함한 클라우드가 악의적으로 해킹 될 시, 사진에 포함된 지문, 자동차 번호판, 카드 번호 등이 유출됨에 따라 대량의 개인정보가 유출될 가능성이 크다. 이에 따라 적절한 기준에 맞게 사진 속 개인 정보 유출을 막을 수 있는 기술의 필요성이 대두되고 있다. 현재의 클라우드 시스템의 문제를 해결하고자 본 연구는 모바일 기기에서 클라우드 서버로 사진을 백업하는 과정에서 영역 검출과 블러링의 과정을 제안하고 있다. 클라우드 업로드 과정에서 사진 속의 개인 정보를 검출한 뒤 이를 블러링하여 클라우드에 저장함으로써 악의적인 접근이 행해지더라도 개인정보의 유출을 방지할 수 있다. 머신러닝과 computer vision library등을 이용하여 이미지 내에 민감한 정보를 포함하고 있는 영역을 학습된 모델을 통해 검출한 뒤, OpenCV를 이용하여 블러링처리를 진행한다 사진 속에 포함될 수 있는 생체정보인 지문은 손 영역을 검출한 뒤, 해당 영역을 블러링을 하여 업로드하고 카드번호나 자동차 번호판이 포함된 사진은 영역을 블러링한 뒤, 암호화하여 업로드 된다. 후에 필요에 따라 본인인증을 거친 후 일정기간 열람을 허용하지만 사용되지 않을 경우 삭제되도록 한다. 개인정보 유출로 인한 피해가 꾸준히 증가하고 있는 지금, 사진 속의 개인 정보를 보호하는 기술은 안전한 통신과 더불어 클라우드의 사용을 더 편리하게 할 수 있을 것으로 기대된다.

An Analysis of Security Problem against Wireless Network in Smartphone (스마트폰 상에서 무선 네트워크 보안 문제점 분석)

  • Kim, Ki-Hawn;Lee, Young Sil;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.383-386
    • /
    • 2014
  • Due to the development of communication technology, a conventional major business through PC, laptop or Tablet PC can be performed via a smartphone and it is increasing the user's convenience. At this point, the user prefers to connect to the Internet using the wireless network because it occurs an additional charge according to the amount of data to be transmitted when using a data communication through 3G or 4G. However, when using a wireless network, there is a possibility of several attacks such as easily steal or modulate the information from the outside or to gain access to personal information stored in the user's smartphone with man-in-the-middle attacks by using the fake AP. IIn this paper, we describe how you can detect the AP when you use LAN of the smartphone, were analyzed for this vulnerability, has not been approved. Furthermore, Also, we discuss ways which can enhance the security when user the access to the internet services (i.e., internet, public/private cloud service, etc.) via wireless network in smartphone.

  • PDF

An Analysis of Impact on the Quality of Life for Chronic Patients based Big Data (빅데이터 기반 만성질환자의 삶의 질에 미치는 영향분석)

  • Kim, Min-kyoung;Cho, Young-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1351-1356
    • /
    • 2019
  • The purpose of this study is to investigate the effect of personal factors and community factors on the quality of life based on the presence of chronic patients based on the Big Data Platform. As a method of study, second data of 2017 community health survey and Statistics Korea by City·Gun·Gu public office were used and a multi-level analysis was conducted after separating EQ-5D index, individual factor and community factor. As a result, men, age, education level, monthly household income, having economic activity, the number of sports infrastructure were positively associated with the quality of life, and subjective health not good, extremely perceived stress were negatively associated with the quality of life. Research will continue to provide a platform independent of hardware that can utilize the cloud and open source for medical big data analysis in the future.